Security Operations 4

Security Operations 4

Assessment

Quiz

Professional Development

Professional Development

Hard

Created by

Michael Caponpon

FREE Resource

Student preview

quiz-placeholder

35 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Mark wants to have a way to determine if attackers have modified files on a critical web application server. What type of tool should he deploy if he wants to be able to check for changes of this nature?

Drive encryption

File availability monitoring

File encryption

File integrity monitoring

Answer explanation

File integrity monitoring tools use hashes to validate that files match their original content. If the files change, the hashes will not match, allowing the tool to alert administrators that a change has occurred. Drive encryption and file encryption both protect the confidentiality of data but don't indicate changes without a signature. File availability monitoring is not a typical tool, although system or service availability monitoring is.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Katie's organization uses an IoC feed that helps her to identify new threats. A recent feed update includes the following hash for Emotet malware: cecc5bba6193d744837e689e68bc25c43eda7235 Where is Katie most likely going to be able to use this hash to identify potential attacks?

Via her EDR tools

Via her firewall

Via her system logs

All of the above

Answer explanation

Endpoint detection and response (EDR) tools are most likely to use hashing to match known malicious files like this. Firewalls may provide the capability, but system logs do not, ruling out the “all of the above” option.

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following tools is best suited to deploying and maintaining a secure baseline for Windows systems for an entire enterprise?

PowerShell

Group Policy

Manual configuration

Script‐based deployments

Answer explanation

Group Policy is the most common way of deploying baselines throughout Windows organizations. Group Policy Objects (GPOs) are set and managed across the entire Active Directory organization, allowing them to be modified for groups or specific purposes while inheriting most settings from the top of the organizational structure. PowerShell is a scripting tool, and both PowerShell and Group Policy are commonly used for specific purposes, but GPOs are typically preferred at scale. Manual configuration is not recommended for an entire organization.

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Perry wants to ensure that an unsecure protocol is secured when in transit through his local network. What solution could he adopt to ensure that this traffic is protected?

Use SD‐WAN.

Wrap the protocol using TLS.

Encrypt all files that are sent using AES.

Encrypt all files that are sent using SHA‐1.

Answer explanation

A common technique to ensure that traffic sent via unsecure protocols remains secure is to wrap it using TLS. SD‐WAN is used to manage external connectivity, and there is no mention of files, only of an unsecure protocol. Even if files were encrypted, the rest of the traffic might leak information. Hashing does not leave data recoverable, making it unusable for this type of use in almost all cases.

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Annie wants to implement a passwordless authentication system. Which of the following would not meet her needs?

Windows Hello

A PIN‐based factor

A cell‐phone authenticator application

A FIDO2 security key

Answer explanation

Passwordless authentication avoids making users provide a password or PIN by using a proof of identity from a device or token. Windows Hello, cell‐based authenticator applications, and FIDO2 security keys all support this, but entering a PIN does not.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Laura wants to harden an ICS and SCADA devices her organization uses to manage critical infrastructure. The devices are old and unsupported, without recent updates. What hardening techniques are most likely to be available to her to help deal with these devices?

Isolation

Segmentation

Adding host‐based firewalls

Configuring host‐based IPS

Answer explanation

Since ICS and SCADA devices need connectivity as part of their design, Laura knows that using segmentation to place the devices in a secure network is likely her best hardening option. Isolating the devices would break the functionality of ICS/SCADA systems. Neither ICS nor SCADA devices typically have support for host‐based firewalls or host‐based IPS.

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Bob uses an IoC feed to allow his SIEM to identify and correlate common malicious activity. What phase of the incident response process best describes this?

Preparation

Detection

Containment

Eradication

Answer explanation

The detection and analysis phases of the incident response process both commonly leverage IoCs to detect and then correlate information to identify incidents. Preparation might involve setting up threat feeds and building automations to help notify security administrators of issues. Containment and eradication may leverage threat data to help understand common actions taken by threat actors, but the SIEM detecting and correlating events is not typically part of containment or eradication.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?